[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r17143: {website} Updated 30seconds with 100% more whitespace and easier to re (website/trunk/en)
Author: phobos
Date: 2008-10-21 22:51:17 -0400 (Tue, 21 Oct 2008)
New Revision: 17143
Modified:
website/trunk/en/30seconds.wml
Log:
Updated 30seconds with 100% more whitespace and easier to read text from
rebecca coseboom.
Modified: website/trunk/en/30seconds.wml
===================================================================
--- website/trunk/en/30seconds.wml 2008-10-21 19:10:48 UTC (rev 17142)
+++ website/trunk/en/30seconds.wml 2008-10-22 02:51:17 UTC (rev 17143)
@@ -7,72 +7,93 @@
<h2>Why You Need Tor</h2>
<hr />
-<p>Few issues affect the legitimacy of the Internet more than protecting
-people's personal data while they're online. Because the vast majority
-of Internet traffic passes along public routes, it is relatively easy
-for prying eyes to view the comings and goings of Internet users -- and
-even link some important financial or personal information to you. These
-snoopers can get their information almost anywhere. Like your Internet
-service provider. Or your favorite website, which may be disclosing your
-shopping patterns. Or maybe a politically rigid government is compiling
-a list of its citizens reading outlawed journals. </p>
-<p>These activities are commonly called "traffic analysis" and
-corporations, governments and other parties are becoming increasingly
-sophisticated at it. While these organizations remain vague in their
-intentions, their effect on Internet users is clear. For some people,
-this electronic spying is a nuisance that can affect their pocketbook;
-for others, it could jeopardize their personal security.</p>
+<p>The vast majority of Internet traffic passes along public routes, making it
+relatively easy for prying eyes to view your comings and goings -- and even
+link some important financial or personal information to you!</p>
-<p>Since 2001, the Tor Project has been developing free and open-source
-software that helps provide anonymity for Internet users. It works by
-allowing users to travel the web on a circuitous route on a set of
-servers positioned around the world. When you use Tor, your route on
-the Internet is indirect, so snoops have a difficult time
-following your path and seizing vital information. Tor also has special
-functionality, called hidden services, that allows users to run
-websites without revealing their location.</p>
+<p>Snoopers can get your information almost anywhere:</p>
+<ul>
+<li>Your Internet service provider</li>
+<li>Your favorite website or online store</li>
+</ul>
+<p>These activities are commonly called traffic analysis and corporations,
+marketing organizations, governments, and other parties are becoming
+increasingly sophisticated at it.</p>
+
+<p>Traffic Analysis enables: </p>
+<ul>
+<li>Politically rigid governments to compile lists of citizens reading outlawed
+journals</li>
+<li>Thieves, spammers, and phishers to launch progressively sophisticated and
+personalized attacks</li>
+</ul>
+
+<p>For some people, this electronic spying is a nuisance that can affect their
+pocketbook; for others, it jeopardizes their personal security.</p>
+
+<p>Since 2001, the Tor Project has been developing free and
+ open-source software that helps provide anonymity for Internet users. It works
+by allowing users
+to travel the web on a circuitous route on a set of servers positioned
+around the world. When you use Tor, your route on the Internet is indirect,
+so snoops have a difficult time following your path and seizing vital
+information. Tor also has special functionality, called hidden services,
+that allows users to run websites without revealing their location.</p>
+
<p>Tor is compatible with different operating systems, such as Microsoft
Windows, Apple Mac, and various versions of Linux. Tor works with most
programs that connect your computer to the Internet.</p>
-<p>Today, Tor is used by hundreds of thousands of people to protect their
-activities online. These include journalists and human rights workers in
-politically rigid countries communicating with whistle blowers and
-dissidents. Law enforcement officers on Internet sting operations stay
-anonymous with Tor, as do people wanting to post socially sensitive
-information in chat rooms, like rape or abuse survivors and those with
-illnesses. The Tor Network also provides protection for people looking
-for another layer of privacy from the millions of websites bent on
-collecting private information and tracking their moves online.</p>
+<p>Tor is used by hundreds of thousands of people to protect their activities
+online:</p>
+<ul>
+<li>Journalists who need to protect their sources</li>
+<li>Human rights workers</li>
+<li>Dissidents in politically rigid countries</li>
+<li>Whistle blowers who fear retribution</li>
+<li>Law enforcement officers on Internet sting operations</li>
+<li>People wanting to post socially sensitive information in chat
+rooms, like rape or abuse survivors and those with stigmatized illnesses.</li>
+</ul>
+<p>The Tor Network also provides protection for people looking for another
+layer of privacy from the millions of websites bent on collecting private
+information and tracking their moves online.</p>
+
<h2>Why Tor Needs You</h2>
<hr />
-<p>Other than a few developers, the Tor Project is largely run by
-volunteers. To help keep Tor's worldwide server network running and its
-open source software up-to-date, the Tor project is looking for new
-sponsors and funding. Join organizations like Google, Bell Security
-Solutions, SRI International, the National Science Foundation, the
-NLnet Foundation from the Netherlands, Human Rights Watch, and more than
-500 individuals who have donated funds to the Tor Project.</p>
+<p>Other than a few developers, the Tor Project is largely run by volunteers.
+To help keep Tor's worldwide server network running and its open source
+software up-to-date, the Tor project is looking for new sponsors and
+funding.</p>
-<p>We guarantee your money will be put to good use. For every dollar
-donated to the Tor Project, 75 cents goes directly into development. We
-also promise good service. Sponsors receive personal attention, better
+<p>We guarantee your money will be put to good use. For every dollar donated
+to the Tor Project, 75 cents goes directly into development.</p>
+
+<p>Sponsors receive personal attention, better
support, and the chance to help us choose which of our priorities we
should focus on next.</p>
-<p>The Tor Project is a registered 501(c)(3) non-profit, making donations
-tax deductible for those living in the United States or those paying
-taxes with charitable donation reciprocity with the U.S.</p>
+<p>Your contribution is tax deductible! The Tor Project is a registered
+501(c)(3) non-profit, making donations tax deductible for those living in
+the United States or those paying taxes with charitable donation reciprocity
+with the U.S.</p>
-<p>In this day and age, Tor provides a vital layer of protection for you
-and your data. Your donations will help keep this project on the cutting
-edge. If you have any questions about funding the Tor Project, please
-contact: donations@xxxxxxxxxxxxxx</p>
+<p>You'll be in good company! Our sponsors include Google, Bell Security
+Solutions, SRI International, The National Science Foundation, The
+Netherlands' NLnet Foundation, Human Rights Watch and more than 500
+individuals who have donated funds to the Tor Project.</p>
+<p>You'll feel good because you're protecting your information and your
+rights. In this day and age, Tor provides a vital layer of protection for
+you and your data.</p>
+
+<p>Please join us! Your donations will help keep this important project on the
+cutting edge. If you have any questions about funding the Tor Project, please
+contact:
+donations@xxxxxxxxxxxxxx</p>
</div><!-- #main -->
-#include <foot.wmi>
-
+#include <foot.wmi>
\ No newline at end of file